Vulnerability Details : CVE-2023-38701
Potential exploit
Hydra is the layer-two scalability solution for Cardano. Users of the Hydra head protocol send the UTxOs they wish to commit into the Hydra head first to the `commit` validator, where they remain until they are either collected into the `head` validator or the protocol initialisation is aborted and the value in the committed UTxOs is returned to the users who committed them. Prior to version 0.12.0, the `commit` validator contains a flawed check when the `ViaAbort` redeemer is used, which allows any user to spend any UTxO which is at the validator arbitrarily, meaning an attacker can steal the funds that users are trying to commit into the head validator. The intended behavior is that the funds must be returned to the user which committed the funds and can only be performed by a participant of the head. The `initial` validator also is similarly affected as the same flawed check is performed for the `ViaAbort` redeemer. Due to this issue, an attacker can steal any funds that user's try to commit into a Hydra head. Also, an attacker can prevent any Hydra head from being successfully opened. It does not allow an attacker to take funds which have been successfully collected into and currently reside in the `head` validator. Version 0.12.0 contains a fix for this issue.
Vulnerability category: Input validation
Products affected by CVE-2023-38701
- cpe:2.3:a:iohk:hydra:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38701
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38701
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2023-38701
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2023-38701
-
https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Commit.hs#L94-L97
hydra/hydra-plutus/src/Hydra/Contract/Commit.hs at master · input-output-hk/hydra · GitHubProduct
-
https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18
hydra/CHANGELOG.md at master · input-output-hk/hydra · GitHubRelease Notes
-
https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6
Committed UTxOs at Commit validator and UTxOs at Initial validator can be spent arbitrarily by anyone · Advisory · input-output-hk/hydra · GitHubExploit;Third Party Advisory
-
https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Util.hs#L32-L42
hydra/hydra-plutus/src/Hydra/Contract/Util.hs at master · input-output-hk/hydra · GitHubProduct
Jump to